Pharmaceutical Company “Pfizer” Leaked Private Client Data

Last updated September 17, 2021
Written by:
Bill Toulas
Bill Toulas
Cybersecurity Journalist

Pfizer, one of the largest pharmaceutical companies in the world, has made a critical mistake in the configuration of one of their buckets and left it accessible by anyone with a web browser. This “typical” error has severe implications for the exposed people’s privacy as the particular bucket contained prescription drug details, full names, home addresses, email addresses, phone numbers, and some details on their medical status.

The discovery of this bucket was made by researchers N. Rotem and R. Locar on July 9, 2020. The vendors were contacted four days later but failed to respond. The researchers sent a new notice on July 19, 2020, and then a third one on September 22, 2020. Pfizer finally responded to the third notice and took action to secure the bucket on September 23, 2020, so the total period of exposure was at least 45 days.

Further Reading: How Long Before Hackers Scrape AWS Credentials on Public GitHub Repos?

The transcripts that were exposed along with the data mentioned above concern the following drugs:

This information is key for scammers and phishing actors. There are entire conversations between Pfizer customer support agents and the clients who called them, with the PII mentioned right there on the same files. All that said, the exposure is dire and introduces a wide spectrum of potential malicious exploitation scenarios.

Source: VPN Mentor

If you have contacted Pfizer about any of the above drugs, you should contact them again to ask about whether this incident has impacted you or not. If you receive any emails, calls, or SMS claiming to come from Pfizer, be very cautious as it could be scammers attempting to phish you.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: